ransomware spam pentest IoT phishing security awareness Cyber Security FTP VPN integrity Proofpoint resilience PHI confidentiality network virus PII identity theft IOC admin Dark Web CIA triad bug spoofing breach encryption WISP vulnerability antivirus defense evasion cyber attack BEC cryptography worm vishing risk packet DDoS exploit IDS zero- day incident response IP HIPAA OS SyssecAdmin compliance Cyber Defense botnet escalation EDR MFA incident spyware security policy insider threat training Defense- in-depth rootkit firewall smishing social engineering APT IPS availability business continuity hacker Security Operations risk assessment passphrase malware password ransomware spam pentest IoT phishing security awareness Cyber Security FTP VPN integrity Proofpoint resilience PHI confidentiality network virus PII identity theft IOC admin Dark Web CIA triad bug spoofing breach encryption WISP vulnerability antivirus defense evasion cyber attack BEC cryptography worm vishing risk packet DDoS exploit IDS zero- day incident response IP HIPAA OS SyssecAdmin compliance Cyber Defense botnet escalation EDR MFA incident spyware security policy insider threat training Defense- in-depth rootkit firewall smishing social engineering APT IPS availability business continuity hacker Security Operations risk assessment passphrase malware password
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
ransomware
spam
pentest
IoT
phishing
security awareness
Cyber Security
FTP
VPN
integrity
Proofpoint
resilience
PHI
confidentiality
network
virus
PII
identity theft
IOC
admin
Dark Web
CIA triad
bug
spoofing
breach
encryption
WISP
vulnerability
antivirus
defense evasion
cyber attack
BEC
cryptography
worm
vishing
risk
packet
DDoS
exploit
IDS
zero-day
incident response
IP
HIPAA
OS
SyssecAdmin
compliance
Cyber Defense
botnet
escalation
EDR
MFA
incident
spyware
security policy
insider threat
training
Defense-in-depth
rootkit
firewall
smishing
social engineering
APT
IPS
availability
business continuity
hacker
Security Operations
risk assessment
passphrase
malware
password